Sciweavers

5766 search results - page 1026 / 1154
» Reverse Engineering of Data
Sort
View
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 8 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
GLVLSI
2007
IEEE
141views VLSI» more  GLVLSI 2007»
15 years 8 months ago
A synchronization algorithm for local temporal refinements in perfectly synchronous models with nested feedback loops
he abstract and simple computation and communication mechanism in the synchronous computational model it is easy to simulate synchronous systems and to apply formal verification m...
Tarvo Raudvere, Ingo Sander, Axel Jantsch
HIPC
2007
Springer
15 years 8 months ago
Accomplishing Approximate FCFS Fairness Without Queues
First Come First Served (FCFS) is a policy that is accepted for implementing fairness in a number of application domains such as scheduling in Operating Systems, scheduling web req...
K. Subramani, Kamesh Madduri
ICANN
2007
Springer
15 years 8 months ago
Topology Aware Internet Traffic Forecasting Using Neural Networks
Forecasting Internet traffic is receiving an increasing attention from the computer networks domain. Indeed, by improving this task efficient traffic engineering and anomaly detect...
Paulo Cortez, Miguel Rio, Pedro Sousa, Miguel Roch...
ICCAD
2007
IEEE
165views Hardware» more  ICCAD 2007»
15 years 8 months ago
Automated refinement checking of concurrent systems
Stepwise refinement is at the core of many approaches to synthesis and optimization of hardware and software systems. For instance, it can be used to build a synthesis approach for...
Sudipta Kundu, Sorin Lerner, Rajesh Gupta
« Prev « First page 1026 / 1154 Last » Next »